Algorithms, Digital Signatures, and Pragmatics

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptographic Technologies
Overview of Cryptography Oct. 29, 2002 Su San Im CS Dept. EWU.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Security 2 Distributed Systems Lecture# 15. Overview Cryptography Symmetric Assymeteric Digital Signature Secure Digest Functions Authentication.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Crypto Bro Rigby. History
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography, Authentication and Digital Signatures
SECURITY Chapter 7.3 – 7.5 Presentation by Deepthi Reddy.
Midterm Review Cryptography & Network Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Cryptography and the Web Lincoln Stein Whitehead Institute/MIT Center for Genome Research.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Some Backgrounds on Network Security Rocky K. C. Chang 12 February 2003.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 11: Security.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Algorithms, Digital Signatures, and Pragmatics Cryptography Algorithms, Digital Signatures, and Pragmatics Frequently, presenters must deliver material of a technical nature to an audience unfamiliar with the topic or vocabulary. The material may be complex or heavy with detail. To present technical material effectively, use the following guidelines from Dale Carnegie Training®.   Consider the amount of time available and prepare to organize your material. Narrow your topic. Divide your presentation into clear segments. Follow a logical progression. Maintain your focus throughout. Close the presentation with a summary, repetition of the key steps, or a logical conclusion. Keep your audience in mind at all times. For example, be sure data is clear and information is relevant. Keep the level of detail and vocabulary appropriate for the audience. Use visuals to support key points or steps. Keep alert to the needs of your listeners, and you will have a more receptive audience. Arun A Tharuvai CSC8530 November 25, 2003

Introduction Cryptographic Algorithms Digital Signatures Cryptography Pragmatics In your opening, establish the relevancy of the topic to the audience. Give a brief preview of the presentation and establish value for the listeners. Take into account your audience’s interest and expertise in the topic when choosing your vocabulary, examples, and illustrations. Focus on the importance of the topic to your audience, and you will have more attentive listeners.

Cryptographic Algorithms Convert plaintext message M to ciphertext {M}K using an encryption algorithm E, and a key K E(K,M) = {M} K Secrecy should lie in the key, not the algorithm If you have several points, steps, or key ideas use multiple slides. Determine if your audience is to understand a new idea, learn a process, or receive greater depth to a familiar concept. Back up each point with adequate explanation. As appropriate, supplement your presentation with technical support data in hard copy or on disc, e-mail, or the Internet. Develop each point adequately to communicate with your audience.

Cryptographic Algorithms Symmetric Algorithms (Secret key) Same key is used for encryption and decryption, and shared by both parties Asymmetric Algorithms (Public key) A public key, used by anyone for encryption A corresponding private key is used for decryption.

Cryptographic Algorithms Block Ciphers Operate on fixed-size blocks of data. 64 bits is a common size. Useful for non-realtime data, including email and data. Stream Ciphers Operate on single bits of data. A stream of bits is used by a function known as a keystream generator. In practice very similar to block ciphers. CBC mode Each plain text block is combined with the preceding ciphertext block using XOR before it is encrypted Prevents similar blocks from encrypting to the same result.

Design Techniques Confusion Diffusion Use of reversible mathematical operations like XOR and bitshifting to combine each block of plaintext with a key Diffusion Use of techniques like transposing portions of each plaintext to reduce regular patterns in plaintext

Secret-key Algorithms TEA DES IDEA AES (Rijndael)

DES Data Encryption Standard Designed to be fast in hardware and slow in software. 56-bit key is used to encrypt 64 bit blocks Bit permutation, combined with 16 rounds of performing the XOR operation with different 48-bit subsets of the key. Chosen in 1977. In 1998, the EFF showed that it was possible to build a machine to crack DES keys in < 3 days for under $250,000, including design costs. Triple DES (3DES) – applies DES three times using 2 keys, as follows: E3DES(K1,K2,M) = EDES (K1,DDES (K2,EDES (K1,M))) and is effectively as strong as a 112-bit private key. However, it’s very slow.

Public-key Algorithms RSA Diffie-Helman El-Gamal Elliptic curve algorithms

RSA Most widely used public key encryption standard. Based upon the difficulty of factoring the product of two very large numbers. To generate a key-pair Choose two large prime numbers, P and Q. N = P * Q Z = (P-1)* (Q-1) d is any number relatively prime to Z. e is a number, such that e*d = 1 mod Z The encryption key is e,N and the decryption key is the pair d,N To encrypt plaintext M, E(e,N,M) = Me mod N To decrypt ciphertext c, D(d,N,C) = cd mod N

Hybrid Protocols SSL/TLS SSH PGP/GPG Negotiable encryption and authentication algorithms. SSH PGP/GPG Uses RSA to encrypt a secret key which is then used for encrypting a document via IDEA, or 3DES

Properties of Digital Signatures Authentic Unforgeable Non-repudiable

Digital Signatures Digital Signing Digest Functions

Public Key Signatures A computes a digest of M, H(M), and encrypts it with his private key. A then sends it along with M to B B then uses A’s K_pub to decrypt

Secret Key signatures Useful when two participants have already agreed upon shared key via a different channel, or public key cryptography. A concatenates M with K, and computes the digest, H(M+K) = h, sending M,h B concatenates M with K, H(M+K) = h’ comparing with h. If they’re equal the message was sent by someone with K.

Secure digest Functions – properties Ease of computing hash Difficulty of generating message from hash Difficulty of finding another message that maps to the same hash value

Secure Digest Functions MD5 SHA Symmetric algorithm using CBC

Secure Digest Functions Birthday attack I am writing {this memo | } to { demand | request | unform you} that {Fred | Mr. Fred Jones} {must | } be { fired | terminated} {at once | immediately}. As the {July 11| 11 July} {memo| memorandum} {from | issued by} {personnel| human resources} states, to meet {our | the corporate} {quarterly | third quarter} budget {targets | goals}, {we must eliminate all discretionary spending | all discretionary spending must be eliminated.} {Despite | Ignoring } that {memo | memorandum | order }, Fred { ordered | purchased } {PostIts | nonessential supplies} in a flagrant disregard for the company’s {budgetary crisis | current financial difficulties}.

Certificate standards, Authorities X.509 SPKI

Cryptography Pragmatics Performance Legal Issues Key sizes and speed

Cryptographic Performance Key/hash size Speed (kb/s) Secret TEA 128 700 DES 56 350 3DES 112 120 IDEA Public RSA 512 7 2048 1 Message Digest MD5 1740 SHA 160 750

Legal and Political Issues Until recently, there were severe restrictions on cryptography, especially export controls, including teaching of such knowledge to foreign nationals in the US. The FBI and NSA wanted restrictions for ease of decrypting both foreign and domestic communications. Algorithms approved for export were limited to 40-bit encryption. Easily breakable with modern technology. Proposals in the mid-90s called for mandatory key-recovery for products exported, and even those used internally. Currently, export controls now only exist on the T-7 countries. As of 2000, Cryptographic source code can be exported as long as copies are sent to the Bureau of Industry and Security of Commerce department.

Conclusion The end Determine the best close for your audience and your presentation. Close with a summary; offer options; recommend a strategy; suggest a plan; set a goal. Keep your focus throughout your presentation, and you will more likely achieve your purpose.

References Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security: Private Communication in a Public World, Prentice Hall, Inc, Upper Saddle River, New Jersey, 1995 505pp. Schneier, B., Applied Cryptography, 2nd ed., John Wiley & Sons, New York, 1996, 675 pp. Electric Frontier Foundation, Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design, O’Reilly & Associates, Sevastopol, California, 1998, online at http://cryptome.org/cracking-des.htm George Coulouris, Jean Dollimore, Tim Kindberg, Distributed Systems: Concepts and Design 3rd ed, Addison-Wesley, New York, 2001, pp 272-291.